1/16
These flashcards cover key concepts related to risk analysis, threats, and threat actors discussed in the lecture.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Threat
Any potential danger that could exploit vulnerabilities in an environment to compromise or damage an asset.
Internal Threats
Threats that originate from within an organization, such as accidental disclosures or actions by a malicious insider.
External Threats
Threats that originate from outside the organization, including natural disasters and attacks from individuals or groups.
Script Kitties
Individuals, often less skilled, who use automated tools to exploit systems, generally driven by curiosity or mischief.
Hacktivists
Individuals who hack for political motives, aiming to raise awareness or make a statement.
Cybercrime
Criminal activities conducted via the internet for the purpose of financial gain.
Cyberterrorism
Attacks funded by nation states aimed at causing disruption or harm to target systems.
Advanced Persistent Threats (APTs)
Highly skilled attackers who maintain a persistent presence in a target environment, using sophisticated techniques to avoid detection.
Initial Compromise
The first step in an APT attack where the attacker gains access to the target environment.
Privilege Escalation
The process of an attacker obtaining higher access rights within a system after initial entry.
Social Engineering
Manipulative techniques aimed at persuading individuals to divulge confidential information.
Zero-Day Exploit
A previously unknown vulnerability that attackers can exploit before it is patched.
Lateral Movement
The technique used by attackers to move through a network after gaining access to find additional targets.
Persistence in Cyber Attacks
The capability of an attacker to maintain their presence in a system over time to exploit vulnerabilities repeatedly.
Vishing
Voice phishing, a type of social engineering attack conducted over the phone.
Smishing
SMS phishing, where attackers use text messages to trick individuals into revealing personal information.
Third Party Compromise
When attackers target service providers with weaker security to gain access to a client's environment.